Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • At the Beijing half-marathon, several humanoid robots beat human winners by 10+ minutes; a robot made by Honor beat the human world record held by Jacob Kiplimo (Reuters)
    • 1000xResist Studio’s Next Indie Game Asks: Can You Convince an AI It Isn’t Human?
    • Efficient hybrid minivan delivers MPG
    • How Can Astronauts Tell How Fast They’re Going?
    • A look at the AI nonprofit METR, whose time-horizon metrics are used by AI researchers and Wall Street investors to track the rapid development of AI systems (Kevin Roose/New York Times)
    • Double Dazzle: This Weekend, There Are 2 Meteor Showers in the Night Sky
    • asexual fish defy extinction with gene repair
    • The ‘Lonely Runner’ Problem Only Appears Simple
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, April 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»In search of riches, hackers plant 4G-enabled Raspberry Pi in bank network
    News

    In search of riches, hackers plant 4G-enabled Raspberry Pi in bank network

    Editor Times FeaturedBy Editor Times FeaturedAugust 4, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    “One of the crucial uncommon parts of this case was the attacker’s use of bodily entry to put in a Raspberry Pi machine,” Group-IB Senior Digital Forensics and Incident Response Specialist Nam Le Phuong wrote. “This machine was related on to the identical community change because the ATM, successfully inserting it contained in the financial institution’s inside community. The Raspberry Pi was outfitted with a 4G modem, permitting distant entry over cell information.”

    To keep up persistence, UNC2891 additionally compromised a mail server as a result of it had fixed Web connectivity. The Raspberry Pi and the mail server backdoor would then talk by utilizing the financial institution’s monitoring server as an middleman. The monitoring server was chosen as a result of it had entry to virtually each server throughout the information heart.

    The Community Monitoring Server as an middleman between the Raspberry Pi and the Mail Server.

    Credit score:
    Group-IB

    The Community Monitoring Server as an middleman between the Raspberry Pi and the Mail Server.


    Credit score:

    Group-IB

    As Group-IB was initially investigating the financial institution’s community, researchers seen some uncommon behaviors on the monitoring server, together with an outbound beaconing sign each 10 minutes and repeated connection makes an attempt to an unknown machine. The researchers then used a forensic instrument to research the communications. The instrument recognized the endpoints as a Raspberry Pi and the mail server however was unable to determine the method names chargeable for the beaconing.



    The forensic triage instrument is unable to gather the related course of identify or ID related to the socket.

    Credit score:
    Group-IB

    The forensic triage instrument is unable to gather the related course of identify or ID related to the socket.


    Credit score:

    Group-IB

    The researchers then captured the system reminiscence because the beacons had been despatched. The overview recognized the method as lightdm, a course of related to an open supply LightDM show supervisor. The method seemed to be reliable, however the researchers discovered it suspicious as a result of the LightDM binary was put in in an uncommon location. After additional investigation, the researchers found that the processes of the customized backdoor had been intentionally disguised in an try and throw researchers off the scent.

    Phuong defined:

    The backdoor course of is intentionally obfuscated by the menace actor by using course of masquerading. Particularly, the binary is called “lightdm”, mimicking the reliable LightDM show supervisor generally discovered on Linux methods. To reinforce the deception, the method is executed with command-line arguments resembling reliable parameters – for instance,

    lightdm –session youngster 11 19 — in an effort to evade detection and mislead forensic analysts throughout post-compromise investigations.

    These backdoors had been actively establishing connections to each the Raspberry Pi and the interior Mail Server.

    As famous earlier, the processes had been disguised utilizing the Linux bind mount. Following that discovery, Group-IB added the method to the MITRE ATT&CK framework as “T1564.013 – Conceal Artifacts: Bind Mounts.”

    Group-IB didn’t say the place the compromised switching tools was positioned or how attackers managed to plant the Raspberry Pi. The assault was detected and shut down earlier than UNC2891 was in a position to obtain its closing aim of infecting the ATM switching community with the CakeTap backdoor.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    At the Beijing half-marathon, several humanoid robots beat human winners by 10+ minutes; a robot made by Honor beat the human world record held by Jacob Kiplimo (Reuters)

    April 19, 2026

    A look at the AI nonprofit METR, whose time-horizon metrics are used by AI researchers and Wall Street investors to track the rapid development of AI systems (Kevin Roose/New York Times)

    April 19, 2026

    Binance and Bitget to probe a rally in RaveDAO’s RAVE token, which surged 4,500% in a week, after ZachXBT alleged RAVE insiders engineered a large short squeeze (Francisco Rodrigues/CoinDesk)

    April 19, 2026

    Mistral, which once aimed for top open models, now leans on being an alternative to Chinese and US labs, says it’s on track for $80M in monthly revenue by Dec. (Iain Martin/Forbes)

    April 19, 2026

    Airbnb launches a pilot in NYC, LA, and other cities that lets users to select from a range of boutique hotels alongside private homes in a bid to boost growth (Stephanie Stacey/Financial Times)

    April 19, 2026

    Anthropic’s Mythos adds to concerns about rising workloads for open-source maintainers, as many have already been dealing with a “crazy” number of bug reports (Chris Stokel-Walker/Bloomberg)

    April 18, 2026

    Comments are closed.

    Editors Picks

    At the Beijing half-marathon, several humanoid robots beat human winners by 10+ minutes; a robot made by Honor beat the human world record held by Jacob Kiplimo (Reuters)

    April 19, 2026

    1000xResist Studio’s Next Indie Game Asks: Can You Convince an AI It Isn’t Human?

    April 19, 2026

    Efficient hybrid minivan delivers MPG

    April 19, 2026

    How Can Astronauts Tell How Fast They’re Going?

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Sunday Night Football: How to Watch Packers vs. Cowboys Tonight

    September 28, 2025

    Early Kindle Black Friday Deals and Amazon Device Sales (2024)

    November 26, 2024

    Ketogenic diet may protect brain from Alzheimer’s in APOE4 carriers

    October 10, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.